
Sign up to save your podcasts
Or


Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.
By Dr Jason EdwardsShadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.